From nobody Wed Oct 18 17:09:49 2023 X-Original-To: freebsd-ports@mlmmj.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mlmmj.nyi.freebsd.org (Postfix) with ESMTP id 4S9cm907JWz4xH6J for ; Wed, 18 Oct 2023 17:10:01 +0000 (UTC) (envelope-from brnrd@freebsd.org) Received: from smtp-out01.qsp.nl (smtp-out01.qsp.nl [193.254.214.165]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id 4S9cm85BF8z4QHv for ; Wed, 18 Oct 2023 17:10:00 +0000 (UTC) (envelope-from brnrd@freebsd.org) Authentication-Results: mx1.freebsd.org; none Received: from smtp.brnrd.eu (5921114a.static.cust.trined.nl [89.33.17.74]) by smtp01.qsp.nl (Postfix) with ESMTPSA id ED68D1579B; Wed, 18 Oct 2023 19:09:50 +0200 (CEST) Received: from mail.bachfreund.nl (unknown [127.12.7.10]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256) (No client certificate requested) by smtp.brnrd.eu (Postfix) with ESMTPSA id 4S9clx6xG5zJbC; Wed, 18 Oct 2023 17:09:49 +0000 (UTC) List-Id: Porting software to FreeBSD List-Archive: https://lists.freebsd.org/archives/freebsd-ports List-Help: List-Post: List-Subscribe: List-Unsubscribe: Sender: owner-freebsd-ports@freebsd.org X-BeenThere: freebsd-ports@freebsd.org MIME-Version: 1.0 Date: Wed, 18 Oct 2023 17:09:49 +0000 From: Bernard Spil To: Tatsuki Makino Cc: freebsd-ports@freebsd.org Subject: Re: HEADS-UP: security/openssl switching to 3.0 branch In-Reply-To: References: <92667a5ea6afeab7ce9c55528af34f49@freebsd.org> <48b835a442707d7b8db4f4b270c12897@freebsd.org> <9e2b9b33-0ef5-49d6-8580-fd01518044cf@groumpf.org> Message-ID: <85391598620119435f117d41d4eb7c83@freebsd.org> X-Sender: brnrd@freebsd.org Content-Type: text/plain; charset=US-ASCII; format=flowed Content-Transfer-Encoding: 7bit X-Spamd-Bar: ---- X-Rspamd-Pre-Result: action=no action; module=replies; Message is reply to one we originated X-Spamd-Result: default: False [-4.00 / 15.00]; REPLY(-4.00)[]; ASN(0.00)[asn:12315, ipnet:193.254.214.0/23, country:NL] X-Rspamd-Queue-Id: 4S9cm85BF8z4QHv On 2023-10-18 03:22, Tatsuki Makino wrote: > Tatsuki Makino wrote on 2023/10/18 09:06: >> pkg set -n openssl:openssl111 >> pkg set -o security/openssl:security/openssl111 >> Will these changes also update the local.sqlite deps table? :) > > I have run it in my environment. in use :) > From the results of `pkg shell .dump | grep openssl`, it seems that the > rewrite was done as I thought. > A few lines of examples are quoted below. > > INSERT INTO packages > VALUES(27078,'security/openssl111','openssl111','1.1.1w,1','TLSv1.3 > capable SSL and crypto library',replace('T ...(omitted) > INSERT INTO deps > VALUES('security/openssl111','openssl111','1.1.1w,1',22497); > INSERT INTO deps > VALUES('security/openssl111','openssl111','1.1.1w,1',22958); > > This changed the pkg version results as follows. > >> pkg version -v -e openssl111 > openssl111-1.1.1w,1 > succeeds index (index has > 1.1.1w) > > Since PORTEPOCH is different, it seems that it needs to be rebuilt and > reinstalled after all :) > > By the way, security/openssl111 of origin has been disused once, around > 2020-01-01. > And if it is used again, how will PORTEPOCH be treated? > > Regards. At no point was anything committed to security/openssl111 that has EPOCH set. When security/openssl111 was deleted, it was openssl111-1.1.1d https://cgit.freebsd.org/ports/commit/security/openssl111?id=ec9d22cc64ab145058ef25da960430b468b88338 When it was added it was openssl111-1.1.1w https://cgit.freebsd.org/ports/commit/security/openssl111?id=eb45600f807e47956529e5ec3f306539ec798279